Introduction to the new mainframe Chapter 10 Topics in z/os system programming

Size: px
Start display at page:

Download "Introduction to the new mainframe Chapter 10 Topics in z/os system programming"

Transcription

1 Chapter 10 Topics in z/os system programming

2 Objectives In this chapter you will learn to: Discuss the responsibilities of a z/os system programmer Explain system libraries, their use, and methods for managing their content Configure consoles IPL a system 2

3 Key terms HCD IODF SYSRES SMP/E LNKLST IPL WTOR PARMLIB PROCLIB system symbols PSA LPA nucleus LOADPARM SQA 3

4 Considerations for a new application New batch applications i to scheduler New JCL procedures to procedure library Document operational procedures Security privileges Add load libraries to system Automation Reload system (if required) 4

5 What is systems programming? A systems programmer installs, customizes and maintains the operating system To do this they need knowledge of Hardwareare o Storage o Processor Software o System libraries and data sets Current customization ti 5

6 System programming overview System performance and workload management SYSTEM PROGRAMMING Security, Availability and Integrity System parameters and system libraries management Controlling operating activities and functions z/os new features implementation and z/os system maintenance iodfxx Hardware I/O configuration 6

7 z/os operational system administration is: Software installation and maintenance Customize parameters System libraries for software System data sets z/os system address spaces and subsystems Real and virtual storage 7

8 z/os Workload Manager Workload manager (WLM) is an address space which manages the tasks running on the system Uses an installation-defined policy to determine relative priority of competing workloads WLM can also be used to manage hardware resources 8

9 System performance System tuning is constant and iterative Only a real problem when resources are constrained WLM is one component Can only manage what is set up Initial set up of initiators and other resources plays a great part 9

10 Job flow Job entry subsystem (JES) controls job flow Receives jobs into system Initiates the job Controls initial output processing 10

11 I/O device management Input/output device configuration must be defined to both hardware and software HCD is used to build an I/O definition file This definition can be activated to both software and hardware dynamically Sometimes major changes require an IPL of software or POR of hardware 11

12 Security Protection of data against unauthorized disclosure, transfer, modification or destruction Systems programmer installs and maintains the security system 12

13 Integrity Designed, implemented and maintained to protect against unauthorized access Unauthorized software must not be able to access authorized states Unauthorized software must not be able to bypass system security such as RACF 13

14 Availability System availability is designed to be very high Many systems require 24 hour 7 day operation 14

15 Change control I/T organizations achieve their goals through disciplined change management processes and policy enforcement These goals include: High service availability Increased security Audit readiness Cost savings 15

16 z/os operation This is the day to day management of the operating environment both software and hardware Operator interaction is message and command based Automated processing of the messages and commands is available and operators now manage by exception 16

17 z/os Production Control Build batch schedules Promote programs to production Investigate batch failures 17

18 z/os system libraries z/os software Customization data Non-z/OS (CICS, DB2) Mainframe User defined exits Non-IBM software User data 18

19 Types of data z/os software on SYSRES volumes Non-z/OS software e.g. CICS Non-IBM software Customization data parmlib, IODF User exits User data often the largest pool of volumes 19

20 z/os system libraries These are the most important system libraries SYS1.LINKLIB prime system software library SYS1.LPALIB system subroutines SYS1.NUCLEUS basic supervisor modules SYS1.PROCLIB system procedure JCL SYS1.PARMLIB control parameters 20

21 SYS1.LINKLIB SYS1.LINKLIB is the main software library LNKLST concatenation is a group of system and user-defined libraries which form part of the system search order for load modules Not all on one volume 21

22 System search order for programs Programs (load modules) must be in central storage and therefore in the virtual storage of the address space before they can run System has a defined search order for a newly requested program 22

23 Search order for programs STEPLIB if present JOBLIB if present and no STEPLIB Link Pack Area (LPA) o Dynamic LPA modules o Fixed LPA o Modified LPA o Pageable LPA Linklist 23

24 Overview of LNKLST LNKLST SET System Data Sets SYS1.LINKLIB SYS1.MIGLIB SYS1.CSSLIB Search order Other Load Libraries 24

25 Using PROGxx to define LNKLST A LNKLST set is an ordered list of datasets for processing as the LNKLST concatenation The PROGxx member may be used to define other lists as well as the linklist The linklist must be: o Defined o Have libraries added o Activated 25

26 Example linklist definition: LNKLST DEFINE NAME(LNKSYSA) COPYFROM(CURRENT) LNKLST ADD NAME(LNKSYSA) DSNAME(SYS1.PROD.LOADLIB) LNKLST ADD NAME(LNKSYSA) DSNAME(SYS1.TEST.LOADLIB) LNKLST ACTIVATE NAME(LNKSYSA) 26

27 LLA and VLF Library LookAside is an address space which maintains a copy of the directories of selected libraries to improve performance By default, LLA always caches the linklist directories Virtual Lookaside Facility is another address space which caches the most popular modules which reduces fetch time VLF can also cache other data objects such as RACF tables to improve response 27

28 Libraries and members at IPL time An number of libraries must be present for the system to load at IPL time SYS1.PARMLIB contains the required definitions SYSn.IPLPARM searched for LOADxx SYS1.LPALIB SYS1.PROCLIB SYS1.NUCLEUS 28

29 LOADxx LOADPARM defines the address of the IODF and the suffix of fthe LOADxx member At IPL the system searches for LOADxx in: SYS0.IPLPARM SYS9.IPLPARM on IODF volume SYS1.PARMLIB on the IODF volume SYS1.PARMLIB on the IPL volume 29

30 LOADxx The LOADxx member specifies: The IODF data set name The master catalog name and volume The parmlib concatenation The IEASYSxx member to use 30

31 Defining a logical parmlib Loadxx IODF 00 SYS6 MOEMVSP1 01 Y SYSCAT MPAT1113CATALOG.MCAT.VMPCAT1 HWNAME P201 LPARNAME A1 PARMLIB SYS0.IPLPARM PARMLIB SYS1.OS390R7.PARMLIB PARMLIB SYSPROG.SYS1.PARMLIB Parmlib concatenation SYS0.IPLPARM SYS1.OS390R7.PARMLIB SYSPROG.SYS1.PARMLIB SYS1.PARMLIB Search order 31

32 IEASYSxx This is the main parameter member for z/os IEASYS00 is used by default If essential parameters are not specified then the operator will be prompted Normally all parameters are specified to avoid inconsistent operator response 32

33 Parmlib commands The parmlib concatenation can be displayed using D PARMLIB The parameters used at IPL can be displayed using D IPLINFO The parmlib concatenation can be modified dynamically using SETLOAD xx,parmlib 33

34 Commands to DISPLAY PARMLIB D PARMLIB IEE251I PARMLIB DISPLAY 377 PARMLIB DATA SETS SPECIFIED AT IPL ENTRY FLAGS VOLUME DATA SET 1 S TOTSY1 SYS1.SYSPROG.PARMLIB 2 D TOTSY1 SYS1.PARMLIB 3 S Z04CAT CPAC.PARMLIB 4 S Z04RE1 SYS1.IBM.PARMLIB D IPLINFO IEE254I IPLINFO DISPLAY 379 SYSTEM IPLED AT ON 07/23/2004 RELEASE z/os LICENSE = z/os USED LOADR2 IN SYS0.IPLPARM ON 3800 ARCHLVL = 2 MTLSHARE = N IEASYM LIST = XX IEASYS LIST = (R3,04) (OP) IODF DEVICE 3800 IPL DEVICE 8038 VOLUME Z04RE1 34

35 SYS1.LPALIB The Link Pack Area (LPA) is built at IPL time from the modules defined in the LPALSTxx member of parmlib. SYS1.LPALIB is always the first library used unless overridden by a SYSLIB statement Modules are loaded into common storage at IPL time and so are available to all address spaces 35

36 SYS1.LPALIB Fixed LPA comprises those modules defined in IEAFIXxx that are fixed in central storage Pageable LPA comprises most other modules whose pages are eligible to be stolen Modified LPA has modules which are temporary replacements for PLPA modules and is searched first. 36

37 Example of LPALST member File Edit Edit_Settings Menu Utilities Compilers Test Help EDIT SYS1.PARMLIB(LPALST5B) Columns Command ===> Scroll ===> CSR ******** ***************************** Top of Data ************** SYS2.LPALIB, SYS1.LPALIB, SYS1.SERBLPA, SDF2.V1R4M0.SDGILPA, SYS1.SIATLPA, ING.SINGMOD3, NETVIEW.SCNMLPA1, REXX.V1R3M0.SEAGLPA, ISF.SISFLPA, EOY.SEOYLPA, SYS1.SBDTLPA, CEE.SCEELPA, ****** **************************** Bottom of Data ************** 37

38 IEAFIX member File Edit Edit_Settings Menu Utilities Compilers Test Help EDIT SYS1.PARMLIB(IEAFIX01) Columns Command ===> Scroll ===> CSR ******** ***************************** Top of Data ********************** INCLUDE LIBRARY(SYS1.LPALIB) MODULES (IEAVAR00, /* 7K RCT INIT/TERM */ IEAVAR06, /* RCT INIT/TERM ALIAS */ IGC001G, /* 456 RESTORE(SVC17) */ ICHRFC00, /* RACF IMS/CICS */ ICHRFR00) /* RACF IMS/CICS */ INCLUDE LIBRARY(SYS1.SVCLIB) MODULES(IGC09302) ************************************** Bottom of Data ******************* 38

39 SYS1.PROCLIB When the system is first IPL d either the MSTJCL00 load module or MSTJCLxx in SYS1.PARMLIB is used to provide the JCL for the master scheduler This JCL at a minimum points to SYS1.PROCLIB to provide the JCL procedures for the required tasks to run the system 39

40 Sample master JCL //MSTJCL05 JOB MSGLEVEL=(1,1),TIME=1440 //EXEC PGM=IEEMB860 //STCINRDR DD SYSOUT=(A,INTRDR) //TSOINRDR DD SYSOUT=(A,INTRDR) //IEFPDSI DD DSN=SYS1.PROCLIB,DISP=SHR //IEFPARM DD DSN=SYS1.PARMLIB,DISP=SHR //SYSUADS DD DSN=SYS1.UADS,DISP=SHR //SYSLBC DD DSN=SYS1.BRODCAST,DISP=SHR 40

41 A job s procedure library The JES cataloged procedure in SYS1.PARMLIB contains lists of procedure libraries to be searched for JCL procedures JCLLIB may also be used to specify a private library to be searched first 41

42 Procedure library //PROC00 DD DSN=SYS1.PROCLIB,DISP=SHR SYS1.PROCLIB,DISP SHR // DD DSN=SYS3.PROD.PROCLIB,DISP=SHR //PROC01 DD DSN=SYS1.PROC2,DISP=SHR... //PROCnn DD DSN=SYS1.LASTPROC,DISP=SHR... //MYJOB JOB //MYLIBS JCLLIB ORDER=(MY.PROCLIB.JCL,SECOND.PROCLIB.JCL) JCL) //S1 EXEC PROC=MYPROC

43 System symbols System symbols allow the use of a shared parmlib by two or more systems Each symbol has a name which can be used in various places and then substituted at IPL time Major uses are indirect cataloging and substituting system specific datasets such as the page data sets 43

44 System symbols SYSDEF HWNAME(SCZP801) LPARNAME(A08) SYSNAME(SC04) SYSPARM(R3,04) SYMDEF(&CPCNAME='P801') SYMDEF(&DFHSMHST='ON') SYMDEF(&SYSR2= ZXYSY2 ) SYMDEF(&SYSR3= &SYSR1(1:5).3 ) 44

45 Use of system symbols PAGE=(PAGE.&SYSNAME..&PLPADSN1., PAGE.&SYSNAME..&COMMDSN1., &COMMDSN1 PAGE.&SYSNAME..LOCAL1, PAGE.&SYSNAME..LOCAL2,L) 45

46 Summary The role of the system programmer is to install, customize and maintain the operating system and must be aware of: z/os operational system administration Workload management System performance Job flow I/O device management Security/integrity/availability z/os Operation Change management 46

Session 2826 February 2001. Stop those Unnecessary IPLS: The Dynamic OS/390 Functions

Session 2826 February 2001. Stop those Unnecessary IPLS: The Dynamic OS/390 Functions Stop those Unnecessary IPLS: The Dynamic OS/390 Functions [email protected] March 6, 2002 Session 2859 1 Trademarks and Copyrights Trademarks and Registered trademarks used in this presentation

More information

CA Auditor for z/os. System Review Checklist. r12. Second Edition

CA Auditor for z/os. System Review Checklist. r12. Second Edition CA Auditor for z/os System Review Checklist r12 Second Edition This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Stu Henderson s Clear Explanation of Effective z/os Security Auditing

Stu Henderson s Clear Explanation of Effective z/os Security Auditing Stu Henderson s Clear Explanation of Effective z/os Security Auditing (A Brief Description of the Steps to a Proven Practical Audit Program, Without Much Technical Detail) Stu Henderson The Henderson Group

More information

Utility Mainframe System Administration Training Curriculum

Utility Mainframe System Administration Training Curriculum Utility Mainframe System Administration Training Curriculum MVS SYSTEM ADMINISTRATION MVS SYSTEM ADMINISTRATION- LEVEL 1 TO 1.5 Name of the Module Common for All Administration LSO TSO/ISPF JCL & UTILITIES

More information

z/os Basics: z/os UNIX Shared File System environment and how it works

z/os Basics: z/os UNIX Shared File System environment and how it works z/os Basics: Shared File System environment and how it works Jim Showalter IBM March 1, 2011 Session 9024 1 Trademarks The following are trademarks of the International Business Machines Corporation in

More information

Introduction to the new mainframe Chapter 7: Batch processing and the Job Entry Subsystem (JES)

Introduction to the new mainframe Chapter 7: Batch processing and the Job Entry Subsystem (JES) Chapter 7: Batch processing and the Job Entry Subsystem (JES) Chapter 7 objectives Be able to: Give an overview of batch processing and how work is initiated and managed in the system. Explain how the

More information

So You still Have a Mainframe? Edward Napoleon, CISSP, CISM. ISACA March 17, 2016

So You still Have a Mainframe? Edward Napoleon, CISSP, CISM. ISACA March 17, 2016 1 So You still Have a Mainframe? Edward Napoleon, CISSP, CISM ISACA March 17, 2016 2 So You Still Have a Mainframe In this day of highly distributed systems and networks who still talks about mainframe

More information

Agenda. z/os Ethical Hacking Vulnerability Scanning & Pen Testing. Mark Wilson RSM Partners. Session Number: 12275. l Disclaimer.

Agenda. z/os Ethical Hacking Vulnerability Scanning & Pen Testing. Mark Wilson RSM Partners. Session Number: 12275. l Disclaimer. z/os Ethical Hacking Vulnerability Scanning & Pen Testing Mark Wilson RSM Partners Session Number: 12275 Agenda l Disclaimer l Introduction l Objectives l Mainframe Hacking Fact or Fiction? l Penetration

More information

CA Auditor for z/os. Technical Reference. r12. Second Edition

CA Auditor for z/os. Technical Reference. r12. Second Edition CA Auditor for z/os Technical Reference r12 Second Edition This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Mark Wilson [email protected] Session Details: The Introduction

Mark Wilson markw@rsmpartners.com Session Details: The Introduction Everything you wanted to know about mainframe security, pen testing and vulnerability scanning.. But were too afraid to ask! Mark Wilson [email protected] Session Details: The Introduction Agenda Introduction

More information

z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket

z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket Gary Henderson ASG (Allen Systems Group) 1 March 2011, 9:30 AM-10:30 AM Session Number 8695 Installation and Maintenance Installation and

More information

IBM i Version 7.2. Security Service Tools

IBM i Version 7.2. Security Service Tools IBM i Version 7.2 Security Service Tools IBM i Version 7.2 Security Service Tools Note Before using this information and the product it supports, read the information in Notices on page 37. This edition

More information

z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com

z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. ray.overby@kr-inc.com (312) KRI-0007 www.kr-inc.com 1 z/os VULNERABILITY SCANNING AND MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-inc.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key Resources, Inc. incorporated in 1988

More information

CA JCLCheck Workload Automation

CA JCLCheck Workload Automation PRODUCT SHEET CA JCLCheck Workload Automation CA JCLCheck Workload Automation CA JCLCheck Workload Automation (CA JCLCheck WA) validates z/os JCL before it is submitted for execution. CA JCLCheck WA helps

More information

z/os Basics: z/os UNIX Shared File System environment and how it works

z/os Basics: z/os UNIX Shared File System environment and how it works z/os Basics: Shared File System environment and how it works Jim Showalter IBM March 1, 2011 Session 9024 Trademarks The following are trademarks of the International Business Machines Corporation in the

More information

Setting Up and Using an SMS-Managed Manual Tape Library (MTL) Session 10237 Steve Pryor [email protected]

Setting Up and Using an SMS-Managed Manual Tape Library (MTL) Session 10237 Steve Pryor steve@dtssoftware.com Setting Up and Using an SMS-Managed Manual Tape Library (MTL) Session 10237 Steve Pryor [email protected] Agenda How are tapes managed in SMS? Automated vs. Manual Libraries The OAM Address Space The

More information

Introduction to the new mainframe Chapter 4: Interactive facilities of z/os: TSO/E, ISPF, and UNIX

Introduction to the new mainframe Chapter 4: Interactive facilities of z/os: TSO/E, ISPF, and UNIX Chapter 4: Interactive facilities of z/os: TSO/E, ISPF, and UNIX Chapter 4 objectives Be able to: Log on to z/os Run programs from the TSO READY prompt Navigate through the menu options of ISPF Use the

More information

Disaster Recovery Cookbook for Linux Part 1: Before the Storm

Disaster Recovery Cookbook for Linux Part 1: Before the Storm Disaster Recovery Cookbook for Linux Part 1: Before the Storm David Boyes 2007 Where to Get This Presentation The presentation and sample execs can be downloaded from: http://www.sinenomine.net/publications/presentations

More information

CA Datacom Task Storage Options. User Key ECSA and Data Space

CA Datacom Task Storage Options. User Key ECSA and Data Space CA Datacom Task Storage Options User Key ECSA and Data Space September 19, 2007 1. Overview... 3 2. z/os 1.9 default change that blocks user key CSA... 3 2.1. z/os option AllowUserKeyCSA...3 2.2. CA Datacom

More information

Performance Management for

Performance Management for for Capacity Planners Performance Analysts System Programmers Version 1.0 I July, 2013 Author: Wolfram Greis European Mainframe Academy GmbH Max von Laue Straße 9 D 86156 Augsburg Tel. +49 821 56756 10

More information

CA Integrated Agent Services

CA Integrated Agent Services CA Integrated Agent Services Implementation Guide Version 12.0.00 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred

More information

Cloning for z/os UNIX Service in a Shared File System Environment

Cloning for z/os UNIX Service in a Shared File System Environment Cloning for z/os UNIX Service in a Shared File System Environment Marna Walle Jim Showalter IBM March 14, 2012 Session 10866 Trademarks The following are trademarks of the International Business Machines

More information

Security Service tools user IDs and passwords

Security Service tools user IDs and passwords System i Security Service tools user IDs and passwords Version 5 Release 4 System i Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information and the product

More information

Program Directory for IBM Tivoli License Compliance Manager for z/os V3.2.0. Program Number 5698-A80 FMID HAUD320.

Program Directory for IBM Tivoli License Compliance Manager for z/os V3.2.0. Program Number 5698-A80 FMID HAUD320. IBM Program Directory for IBM Tivoli License Compliance Manager for z/os V3.2.0 Program Number 5698-A80 FMID HAUD320 for Use with z/os Document Date: JULY 2005 GI11-4089-00 Note! Before using this information

More information

ITG Software Engineering

ITG Software Engineering IBM WebSphere Administration 8.5 Course ID: Page 1 Last Updated 12/15/2014 WebSphere Administration 8.5 Course Overview: This 5 Day course will cover the administration and configuration of WebSphere 8.5.

More information

ImageNow Report Library Catalog

ImageNow Report Library Catalog ImageNow Report Library Catalog Business Insight Version: 6.6.x Written by: Product Documentation, R&D Date: February 2012 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc.

More information

Getting Started with Tuning SQL Statements in IBM Data Studio and IBM Data Studio (stand-alone), Version 2.2.1

Getting Started with Tuning SQL Statements in IBM Data Studio and IBM Data Studio (stand-alone), Version 2.2.1 Getting Started with Tuning SQL Statements in IBM Data Studio and IBM Data Studio (stand-alone), Version 2.2.1 Getting Started with Tuning SQL Statements in IBM Data Studio and IBM Data Studio (stand-alone),

More information

21 Things You Didn t Used to Know About RACF

21 Things You Didn t Used to Know About RACF 21 Things You Didn t Used to Know About RACF (A Technical Update for IT Auditors) Stuart Henderson The Henderson Group (301) 229-7187 1 Here Are 21 Things Auditors Should Know About RACF One Person s Opinion,

More information

JD Edwards World. Database Audit Manager Release A9.3 E21957-02

JD Edwards World. Database Audit Manager Release A9.3 E21957-02 JD Edwards World Database Audit Manager Release A9.3 E21957-02 April 2013 JD Edwards World Database Audit Manager, Release A9.3 E21957-02 Copyright 2013, Oracle and/or its affiliates. All rights reserved.

More information

Version 5.0. MIMIX ha1 and MIMIX ha Lite for IBM i5/os. Using MIMIX. Published: May 2008 level 5.0.13.00. Copyrights, Trademarks, and Notices

Version 5.0. MIMIX ha1 and MIMIX ha Lite for IBM i5/os. Using MIMIX. Published: May 2008 level 5.0.13.00. Copyrights, Trademarks, and Notices Version 5.0 MIMIX ha1 and MIMIX ha Lite for IBM i5/os Using MIMIX Published: May 2008 level 5.0.13.00 Copyrights, Trademarks, and Notices Product conventions... 10 Menus and commands... 10 Accessing online

More information

RACF PERFORMANCE TUNING

RACF PERFORMANCE TUNING SHARE - August 2010 Robert S. Hansel Lead RACF Specialist - RSH Consulting, Inc. [email protected] - 617-969-9050 - www.rshconsulting.com 1 RSH PRESENTER Robert S. Hansel is Lead RACF Specialist

More information

Unit Testing with zunit

Unit Testing with zunit IBM Software Group Rational Developer for System z Unit Testing with zunit Jon Sayles / IBM - [email protected] IBM Corporation IBM Trademarks and Copyrights Copyright IBM Corporation 2013, 2014. All

More information

Unit 4 i5/os Work Management

Unit 4 i5/os Work Management Introduction to IBM System i Unit 4 i5/os Work Management Copyright IBM Corporation, 2006. All Rights Reserved. This publication may refer to products that are not currently available in your country.

More information

DB Audit Expert 3.1. Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005

DB Audit Expert 3.1. Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005 DB Audit Expert 3.1 Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005 Supported database systems: Microsoft SQL Server 2000 Microsoft SQL Server 2005 Copyright SoftTree Technologies,

More information

The Flash Express Feature on IBM zenterprise EC12 and z/os exploitation of flash storage

The Flash Express Feature on IBM zenterprise EC12 and z/os exploitation of flash storage The Flash Express Feature on IBM zenterprise EC12 and z/os exploitation of flash storage The IBM zenterprise EC12 (zec12) server introduces the Flash Express feature (FC 0402) that provides a new PCIe

More information

Unicenter CA-Spool Print Management

Unicenter CA-Spool Print Management Unicenter CA-Spool Print Management Getting Started r11 MAN06111039E K00751-1E This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user

More information

Rational Developer for IBM i (RDi) Introduction to RDi

Rational Developer for IBM i (RDi) Introduction to RDi IBM Software Group Rational Developer for IBM i (RDi) Introduction to RDi Featuring: Creating a connection, setting up the library list, working with objects using Remote Systems Explorer. Last Update:

More information

CA Workload Automation Restart Option for z/os Schedulers r11

CA Workload Automation Restart Option for z/os Schedulers r11 PRODUCT SHEET CA Workload Automation Restart Option for z/os Schedulers r11 CA Workload Automation Restart Option for z/os Schedulers r11 CA Workload Automation Restart Option for z/os Schedulers (CA WA

More information

SAP Performance Review/System Health Check

SAP Performance Review/System Health Check Albert Rodi Consulting IT Specialist IBM e-business Technical Sales IBM Corporation 1507 LBJ Freeway Dallas, TX 75381-9054 (972) 280-4791 [email protected] Copyright 2005 IBM Solutions Technical Sales

More information

Lab 3.1.2 Creating a Logical Network Diagram

Lab 3.1.2 Creating a Logical Network Diagram Lab 3.1.2 Creating a Logical Network Diagram Objectives Use router and switch commands to obtain information about an existing network. Use Cisco Network Assistant to obtain information about an existing

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

H211L Bulk File Transfer (BFX)

H211L Bulk File Transfer (BFX) H211L Bulk File Transfer (BFX) for IBM z/os Operating Systems Limited Edition Release 1.6 Memo to Users May 2014 2002-2014 Network Executive Software, Inc. 6420 Sycamore Lane N #300 Maple Grove, MN 55369

More information

CA Log Analyzer for DB2 for z/os

CA Log Analyzer for DB2 for z/os CA Log Analyzer for DB2 for z/os User Guide Version 17.0.00, Third Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as

More information

IBM DB2 Data Archive Expert for z/os:

IBM DB2 Data Archive Expert for z/os: Front cover IBM DB2 Data Archive Expert for z/os: Put Your Data in Its Place Reduce disk occupancy by removing unused data Streamline operations and improve performance Filter and associate data with DB2

More information

ERserver. iseries. Work management

ERserver. iseries. Work management ERserver iseries Work management ERserver iseries Work management Copyright International Business Machines Corporation 1998, 2002. All rights reserved. US Government Users Restricted Rights Use, duplication

More information

CA Gener/OL r7.1. Overview. Business value

CA Gener/OL r7.1. Overview. Business value PRODUCT SHEET CA Gener/OL CA Gener/OL r7.1 CA Gener/OL is an easy-to-use CICS program and application generation system that enhances programmer productivity by automatically handling the complexities

More information

DASD Backup Automation

DASD Backup Automation white paper DASD Backup Automation bluezone.rocketsoftware.com DASD Backup Automation A White Paper by Rocket Software 2013 Rocket Software, Inc. All rights reserved. Rocket and Rocket Software logos are

More information

PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT

PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT 1 PRACTICAL TIPS FOR Z/OS VULNERABILITY SCANNING & PROACTIVE SECURITY MANAGEMENT Key Resources, Inc. [email protected] (312) KRI-0007 www.kr-in.com 2 Ray Overby SKK - ACF2 Developer (1981-1988) Key

More information

Program Directory for Backup and Restore Manager for z/vm. version 1 release 2.0. Program Number 5697-J06

Program Directory for Backup and Restore Manager for z/vm. version 1 release 2.0. Program Number 5697-J06 IBM Program Directory for Backup and Restore Manager for z/vm version 1 release 2.0 Program Number 5697-J06 for Use with z/vm version 5 release 4 z/vm version 6 release 2 z/vm version 6 release 3 Document

More information

Universal Data Mover. User Guide. Indesca / Infitran. Version 4.1.0. udm-user-4101

Universal Data Mover. User Guide. Indesca / Infitran. Version 4.1.0. udm-user-4101 Universal Data Mover User Guide Indesca / Infitran Version 4.1.0 udm-user-4101 Universal Data Mover User Guide Indesca / Infitran 4.1.0 Document Name Document ID Universal Data Mover 4.1.0 User Guide

More information

Distributed File Service SMB Administration

Distributed File Service SMB Administration z/os Distributed File Service SMB Administration SC24-5918-09 z/os Distributed File Service SMB Administration SC24-5918-09 Note Before using this information and the product it supports, read the information

More information

This manual assumes you already have Precurio installed and configured appropriately.

This manual assumes you already have Precurio installed and configured appropriately. Precurio Workflows As you must already know, workflow applications help automate processes that require series of steps usually requiring human intervention, such as an approval from various people in

More information

IBM InfoSphere Guardium S-TAP for VSAM on z/os V8.2 Version 8 Release 2. User's Guide SC19-3346-02

IBM InfoSphere Guardium S-TAP for VSAM on z/os V8.2 Version 8 Release 2. User's Guide SC19-3346-02 IBM InfoSphere Guardium S-TAP for VSAM on z/os V8.2 Version 8 Release 2 User's Guide SC19-3346-02 IBM InfoSphere Guardium S-TAP for VSAM on z/os V8.2 Version 8 Release 2 User's Guide SC19-3346-02 Note:

More information

Configuration and Utilization of the OLAP Cache to Improve the Query Response Time

Configuration and Utilization of the OLAP Cache to Improve the Query Response Time Configuration and Utilization of the OLAP Cache to Improve the Query Response Time Applies to: SAP NetWeaver BW 7.0 Summary This paper outlines the steps to improve the Query response time by using the

More information

BCPii for Dummies: Start to finish installation, setup and usage

BCPii for Dummies: Start to finish installation, setup and usage SHARE Anaheim Winter 2011 BCPii for Dummies: Start to finish installation, setup and usage Steve Warren [email protected] z/os BCPii Design and Development This presentation is for educational purposes

More information

Using the Cisco IOS Command Line Interface

Using the Cisco IOS Command Line Interface CHAPTER 3 Using the Cisco IOS Line Interface 3.1 Using the CLI Cisco IOS software provides a command line interface (CLI) that allows you to configure and manage the Cisco 6200 advanced digital subscriber

More information

REPRINT. Release 1.22. Reference Manual. IBM iseries (AS/400) Developed and Distributed by

REPRINT. Release 1.22. Reference Manual. IBM iseries (AS/400) Developed and Distributed by REPRINT Release 1.22 Reference Manual IBM iseries (AS/400) Developed and Distributed by WorksRight Software, Inc. P. O. Box 1156 Madison, Mississippi 39130 (601) 856-8337 FAX (601) 856-9432 Copyright WorksRight

More information

CA Telon Application Generator

CA Telon Application Generator CA Telon Application Generator IDMS Database SQL Option Guide r5.1 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational

More information

REPRINT. Release 1.20 1.22. User s Guide. iseries (AS/400) Developed and Distributed by

REPRINT. Release 1.20 1.22. User s Guide. iseries (AS/400) Developed and Distributed by REPRINT Release 1.20 1.22 User s Guide IBM IBM iseries iseries (AS/400) (AS/400) Developed and Distributed by WorksRight Software, Inc. P. O. Box 1156 Madison, Mississippi 39130 Phone (601) 856-8337 Fax

More information

Calculator Notes for the TI-Nspire and TI-Nspire CAS

Calculator Notes for the TI-Nspire and TI-Nspire CAS INTRODUCTION Calculator Notes for the Getting Started: Navigating Screens and Menus Your handheld is like a small computer. You will always work in a document with one or more problems and one or more

More information

ESM s management across multi-platforms eliminates the need for various account managers.

ESM s management across multi-platforms eliminates the need for various account managers. DetectIT & Axent s ESM Product Description Axent s Enterprise Security Manager (ESM) provides enterprise-wide, multi-platform management that simplifies and centralizes the administration of security.

More information

CA Workload Automation EE r11.3 Report Server. Fred Brisard

CA Workload Automation EE r11.3 Report Server. Fred Brisard CA Workload Automation EE r11.3 Report Server Fred Brisard Terms of This Presentation This presentation was based on current information and resource allocations as of October 2009 and is subject to change

More information

Central Processing Unit Simulation Version v2.5 (July 2005) Charles André University Nice-Sophia Antipolis

Central Processing Unit Simulation Version v2.5 (July 2005) Charles André University Nice-Sophia Antipolis Central Processing Unit Simulation Version v2.5 (July 2005) Charles André University Nice-Sophia Antipolis 1 1 Table of Contents 1 Table of Contents... 3 2 Overview... 5 3 Installation... 7 4 The CPU

More information

Overview. Business value

Overview. Business value PRODUCT SHEET CA VM:Backup for z/vm CA VM:Backup for z/vm CA VM:Backup for z/vm (CA VM:Backup) provides an efficient and reliable means of backing up CMS and non-cms data in z/vm and mainframe Linux systems.

More information

Information Systems. Capacity Planning Monthly Report

Information Systems. Capacity Planning Monthly Report Information Systems Capacity Planning Monthly Report NOV 87 4Q87... Capacity Planning Monthly Report - November, 1987 This issue of the "Capacity Planning Monthly Report" contains information current through

More information

IBM VisualAge for Java,Version3.5. Remote Access to Tool API

IBM VisualAge for Java,Version3.5. Remote Access to Tool API IBM VisualAge for Java,Version3.5 Remote Access to Tool API Note! Before using this information and the product it supports, be sure to read the general information under Notices. Edition notice This edition

More information

i5/os and related software Distributing software

i5/os and related software Distributing software System i and System p i5/os and related software Distributing software Version 6 Release 1 System i and System p i5/os and related software Distributing software Version 6 Release 1 Note Before using

More information

Application Backup and Restore using Fast Replication Services. Ron Ratcliffe [email protected] March 13, 2012 Session Number 10973

Application Backup and Restore using Fast Replication Services. Ron Ratcliffe rratcliffe@rocketsoftware.com March 13, 2012 Session Number 10973 Application Backup and Restore using Fast Replication Services Ron Ratcliffe [email protected] March 13, 2012 Session Number 10973 Session Agenda What is IBM Tivoli Advanced Backup and Recovery

More information

New Security Options in DB2 for z/os Release 9 and 10

New Security Options in DB2 for z/os Release 9 and 10 New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and

More information

Vadim Computer Managment Group LTD. Next Generation Software Bank Reconcilliation

Vadim Computer Managment Group LTD. Next Generation Software Bank Reconcilliation Next Generation Software Bank Reconciliation Vadim Computer Managment Group LTD. Next Generation Software Bank Reconcilliation Contents i Contents Chapter 1: Bank Reconciliation Transactions 1 Bank Reconciliation

More information

Housekeeping & Maintenance Work Orders

Housekeeping & Maintenance Work Orders Property Management System Functional Specification Housekeeping & Maintenance Work Orders Subject: Author(s): Status: Last Updated: Maintenance Work Orders - Crete Jeff Stivers Complete 5/1/2001 12:00

More information

z/auditing Essentials

z/auditing Essentials z/auditing Essentials VOLUME 1 zenterprise Hardware An Introduction for Auditors Julie-Ann Williams Martin Underwood Craig Warren Steve Tresadern www.newera.com ii z/auditing ESSENTIALS Foreword by Barry

More information

Analyzing IBM i Performance Metrics

Analyzing IBM i Performance Metrics WHITE PAPER Analyzing IBM i Performance Metrics The IBM i operating system is very good at supplying system administrators with built-in tools for security, database management, auditing, and journaling.

More information

Audit TM. The Security Auditing Component of. Out-of-the-Box

Audit TM. The Security Auditing Component of. Out-of-the-Box Audit TM The Security Auditing Component of Out-of-the-Box This guide is intended to provide a quick reference and tutorial to the principal features of Audit. Please refer to the User Manual for more

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

Using Process Monitor

Using Process Monitor Using Process Monitor Process Monitor Tutorial This information was adapted from the help file for the program. Process Monitor is an advanced monitoring tool for Windows that shows real time file system,

More information

Data Warehouse Center Administration Guide

Data Warehouse Center Administration Guide IBM DB2 Universal Database Data Warehouse Center Administration Guide Version 8 SC27-1123-00 IBM DB2 Universal Database Data Warehouse Center Administration Guide Version 8 SC27-1123-00 Before using this

More information

Beyond the Software Life Cycle

Beyond the Software Life Cycle Beyond the Software Life Cycle CA-Endevor Facilitates Ad-hoc Job Processing Southern CA Endevor User Group June 2008 Rose A. Sakach Endevor Practice Leader - RSH Consulting, Inc. [email protected]

More information

SAS Grid Manager Testing and Benchmarking Best Practices for SAS Intelligence Platform

SAS Grid Manager Testing and Benchmarking Best Practices for SAS Intelligence Platform SAS Grid Manager Testing and Benchmarking Best Practices for SAS Intelligence Platform INTRODUCTION Grid computing offers optimization of applications that analyze enormous amounts of data as well as load

More information

Performance rule violations usually result in increased CPU or I/O, time to fix the mistake, and ultimately, a cost to the business unit.

Performance rule violations usually result in increased CPU or I/O, time to fix the mistake, and ultimately, a cost to the business unit. Is your database application experiencing poor response time, scalability problems, and too many deadlocks or poor application performance? One or a combination of zparms, database design and application

More information

Experiences with Using IBM zec12 Flash Memory

Experiences with Using IBM zec12 Flash Memory Experiences with Using IBM zec12 Flash Memory Session 14119 August 13, 2013 Mary Astley ATS - IBM Corporation 2013 IBM Corporation Trademarks The following are trademarks of the International Business

More information

CA Chorus for Security and Compliance Management

CA Chorus for Security and Compliance Management CA Chorus for Security and Compliance Management Site Preparation Guide Version 03.0.00, Fifth Edition This Documentation, which includes embedded help systems and electronically distributed materials,

More information

Snapshot Reports for 800xA User Guide

Snapshot Reports for 800xA User Guide Snapshot Reports for 800xA User Guide System Version 5.1 Power and productivity for a better world TM Snapshot Reports for 800xA User Guide System Version 5.1 NOTICE This document contains information

More information

CHAPTER 15: Operating Systems: An Overview

CHAPTER 15: Operating Systems: An Overview CHAPTER 15: Operating Systems: An Overview The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint

More information

Oracle Database. User s Guide 10g Release 2 (10.2) for IBM z/os (OS/390) B25396-01

Oracle Database. User s Guide 10g Release 2 (10.2) for IBM z/os (OS/390) B25396-01 Oracle Database User s Guide 10g Release 2 (10.2) for IBM z/os (OS/390) B25396-01 April 2006 Oracle Database User s Guide, 10g Release 2 (10.2) for IBM z/os (OS/390) B25396-01 Copyright 2006, Oracle. All

More information

CA NetMaster Network Management for TCP/IP

CA NetMaster Network Management for TCP/IP CA NetMaster Network Management for TCP/IP Installation Guide Release 12.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as

More information

IBM Tivoli Storage Productivity Center (TPC)

IBM Tivoli Storage Productivity Center (TPC) IBM Tivoli Storage Productivity Center (TPC) Simplify, automate, and optimize storage infrastructure Highlights The IBM Tivoli Storage Productivity Center is designed to: Help centralize the management

More information

SupportPac CB12. General Insurance Application (GENAPP) for IBM CICS Transaction Server

SupportPac CB12. General Insurance Application (GENAPP) for IBM CICS Transaction Server SupportPac CB12 General Insurance Application (GENAPP) for IBM CICS Transaction Server SupportPac CB12 General Insurance Application (GENAPP) for IBM CICS Transaction Server ii General Insurance Application

More information

How To Run A Hybrid Batch Processing Job On An Z/Os V1.13 V1 (V1) V1-R13 (V2) V2.1 (R13) V3.1.1

How To Run A Hybrid Batch Processing Job On An Z/Os V1.13 V1 (V1) V1-R13 (V2) V2.1 (R13) V3.1.1 Co:Z Load Balancer on the zenterprise June 22, 2012 http://dovetail.com [email protected] Copyright 2012 Dovetailed Technologies, LLC Slide 1 Agenda zenterprise Environment Hybrid Batch Processing Overview

More information

...2. Standard Installation...4. Example Installation Scenarios...5. Network Installation...8. Advanced Settings...10. Product Requirements

...2. Standard Installation...4. Example Installation Scenarios...5. Network Installation...8. Advanced Settings...10. Product Requirements ...2. Standard Installation...4. Example Installation Scenarios...5. Network Installation...8. Advanced Settings...10. Product Requirements ProjectMatrix 1 Standard Installation Install ProjectNotify from

More information

Monitoring and Administration with SAP on DB2

Monitoring and Administration with SAP on DB2 Monitoring and Administration with SAP on DB2 Introduction to the DBA Cockpit Ralf Stauffer Development Architect, SAP AG SAP on DB2 for Linux, UNIX, and Windows Agenda 1. Managing System Landscapes 2.

More information

Origins of Operating Systems OS/360. Martin Grund HPI

Origins of Operating Systems OS/360. Martin Grund HPI Origins of Operating Systems OS/360 HPI Table of Contents IBM System 360 Functional Structure of OS/360 Virtual Machine Time Sharing 2 Welcome to Big Blue 3 IBM System 360 In 1964 IBM announced the IBM-360

More information

EMC ApplicationXtender Server

EMC ApplicationXtender Server EMC ApplicationXtender Server 6.0 Monitoring Guide P/N 300 008 232 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2009 EMC Corporation. All

More information

The Advantages Of External Security For DB2 And The Migration Towards RACF. Kurt Struyf, infocura

The Advantages Of External Security For DB2 And The Migration Towards RACF. Kurt Struyf, infocura The Advantages Of External Security For DB2 And The Migration Towards RACF Kurt Struyf, infocura 0 Agenda The need for better data security What does DB2 offer? Why externalizing security? Why RACF? How

More information

CA Librarian r4.3. Overview. Business value

CA Librarian r4.3. Overview. Business value PRODUCT SHEET CA Librarian CA Librarian r4.3 CA Librarian for z/os, for z/vse and for z/vm (CA Librarian) is a highly sophisticated and flexible storage medium of source programs and other sets of data

More information

Group Mail Lists. Group Mailing Lists. Populating a Global Mail Lists 4. The Problem 6. The Solution 8. Scheduling Regular Updates 17

Group Mail Lists. Group Mailing Lists. Populating a Global Mail Lists 4. The Problem 6. The Solution 8. Scheduling Regular Updates 17 Group Mail Lists Group Mail Lists 1 Group Mailing Lists 1.1 1.2 1.3 1.4 Populating a Global Mail Lists 4 The Problem 6 The Solution 8 Scheduling Regular Updates 17 Group Mailing Lists Group Mail Lists

More information

Configuring and Tuning SSH/SFTP on z/os

Configuring and Tuning SSH/SFTP on z/os Configuring and Tuning SSH/SFTP on z/os Kirk Wolf / Steve Goetze Dovetailed Technologies [email protected] dovetail.com Monday, March 10, 2014, 1:30PM Session: 14787 www.share.org Session Info/Eval link

More information